Analysis
-
max time kernel
94s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 12:16
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_23184c611c38fc659dc5f58481077997.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_23184c611c38fc659dc5f58481077997.exe
-
Size
1.5MB
-
MD5
23184c611c38fc659dc5f58481077997
-
SHA1
04ad1f40d63a948b76ad9da3b4556df5db0687b3
-
SHA256
dbaf595b729a5fbd682a2da922d9fea0b34f0126c4a11c96392b51eee8462220
-
SHA512
364e35f3f90b7b54c8abc127565c701130f68710b03c32f4d06eb9f768652faf358f8bdc7de95f0963a0e902d9975007ee36d7d717f543bf9aad6f1da77701a1
-
SSDEEP
24576:gPvGhlToPK/vx6WEHyQG87Ik/3Km8GUlVLdAKLGIQHgqs67bfAWeW:gnWBnxSHy8Ew61lVLdnLGI0j1BeW
Malware Config
Extracted
xloader
2.5
fpdi
jencio.com
b9jty7.com
banahinvestments.com
capitolfurniture.net
jlvip1086.com
pompeyocargo.com
designbyshubhi.info
elbauldepecas.com
bracelexx.online
advanceporbrx.xyz
ruihongco.com
wipemirecord.com
goodfoodsme.com
sommpick.com
rangilugujarat.com
realestate5g.com
spunkdlashes.com
palisadestahoehousing.com
brandingsocal.com
privatejetsboston.com
strataguide.com
pragmatismtoday.com
teslapro1.com
picturebookoriginals.com
nbrus.com
lafon-fr.com
studyallenergy.com
opensourcedao.com
cerulecode.com
c2spreader.info
hamiker.com
slimming-belt.store
myraandmarlow.com
sellanycar.online
mokkaoffice.com
strazde.com
haharate.quest
xgustify.xyz
sisoow.rest
awesomeclub98.club
ashleymariephotographyllc.com
mobilethaimassageatl.com
petswastepickup.com
eco1tnpasumo1.xyz
social-nudge.com
osmorobotics.com
99044222.com
xuebaousa.com
madisonbroadband.com
lisworldart.com
tzuzulcode.com
gonzagacargo.com
kanpekisien.com
currysrilanka.com
designedairservices.com
sato76.com
weinsteinanddouglas.com
gearella.com
tes5ci.com
obatkuatsemarang.xyz
tdaiarquitectura.com
reshawna.com
pfmtime.com
eastendfinancial.com
walletwriter.space
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/2324-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2720 set thread context of 2324 2720 JaffaCakes118_23184c611c38fc659dc5f58481077997.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_23184c611c38fc659dc5f58481077997.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2324 JaffaCakes118_23184c611c38fc659dc5f58481077997.exe 2324 JaffaCakes118_23184c611c38fc659dc5f58481077997.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2720 JaffaCakes118_23184c611c38fc659dc5f58481077997.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2324 2720 JaffaCakes118_23184c611c38fc659dc5f58481077997.exe 83 PID 2720 wrote to memory of 2324 2720 JaffaCakes118_23184c611c38fc659dc5f58481077997.exe 83 PID 2720 wrote to memory of 2324 2720 JaffaCakes118_23184c611c38fc659dc5f58481077997.exe 83 PID 2720 wrote to memory of 2324 2720 JaffaCakes118_23184c611c38fc659dc5f58481077997.exe 83 PID 2720 wrote to memory of 2324 2720 JaffaCakes118_23184c611c38fc659dc5f58481077997.exe 83 PID 2720 wrote to memory of 2324 2720 JaffaCakes118_23184c611c38fc659dc5f58481077997.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_23184c611c38fc659dc5f58481077997.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_23184c611c38fc659dc5f58481077997.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_23184c611c38fc659dc5f58481077997.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_23184c611c38fc659dc5f58481077997.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2324
-